lion-gu / ioc-explorerLinks
Explore Indicators of Compromise Automatically
☆94Updated 5 years ago
Alternatives and similar repositories for ioc-explorer
Users that are interested in ioc-explorer are comparing it to the libraries listed below
Sorting:
- An easy ATT&CK-based Sysmon hunting tool, showing in Blackhat USA 2019 Arsenal☆202Updated 3 years ago
- A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会☆165Updated 5 years ago
- Historical list of {Cobalt Strike,NanoHTTPD} servers☆121Updated 6 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆104Updated 3 years ago
- ☆11Updated last month
- 威胁检测规则集☆15Updated 6 years ago
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 5 years ago
- Suspicious DGA from PDNS and Sandbox.☆185Updated 3 years ago
- Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.☆172Updated last year
- The python client of passivedns.cn☆97Updated 6 years ago
- ☆54Updated last year
- ☆9Updated 8 years ago
- ☆79Updated 2 years ago
- A repository of open source reports on different malware families used in targeted cyber intrusions ("APT").☆52Updated 10 years ago
- Code snippet accompanying blog post☆30Updated 9 years ago
- Simple web shell scanner written in Golang.☆90Updated 6 years ago
- Malware Sinkhole List in various formats☆103Updated 3 years ago
- Snort rules☆35Updated 6 years ago
- Elemental - An ATT&CK Threat Library☆318Updated 2 years ago
- The oledump-contrib repository contains plugins and enhancements for the oledump tool published by Didier Stevens.☆54Updated 9 years ago
- IDS Bypass tricks☆122Updated 6 years ago
- 精心制作的恶意软件分析工具和资源列表A curated list of awesome malware analysis tools and resources☆42Updated 7 years ago
- ☆33Updated 6 years ago
- Toolset for research malware and Cobalt Strike beacons☆211Updated 4 months ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 7 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆78Updated 7 years ago
- ICS/SCADA/PLC Discovery Tools Releases☆40Updated 10 years ago
- 《横向移动攻击与检测技术》专栏文章☆17Updated 5 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆260Updated 6 years ago
- Automatically exported from code.google.com/p/plcscan☆58Updated 10 years ago